News2018-11-10T20:43:40-05:00

Corporate Espionage and Countermeasures News

News updates and articles are presented regarding corporate espionage, eavesdropping, electronic countermeasures, and TSCM. Please subscribe for automatic updates by entering your email address in the box on the right. You can search past articles and view archives in the column on the right.

Excerpts from recent posts are shown below. Click on the title to view the entire article.

Evidence of eavesdropping may be right in front of you.

Even the best eavesdroppers may be nervous or have a lot on their minds. This could cause them to be careless when planting a bug or listening device. This would be true if they were spy-shop amateurs, disgruntled employees, or even state sponsored agents. Failure to clean up well after installing a device could be the clue that gives them away.

October 5th, 2016|

Eavesdropping on City Hall- Phone System Used for Wiretapping

Former Lake Station mayor had secretly recorded approximately 425,000 calls between Oct. 12, 2011, and Aug. 13, 2015, and continued the activity even after being released on bond as his federal corruption cases were pending. An audit of your phone system operations can help reveal potential misuse such as this. Almost all telecom systems in use today have features that can allow various forms of eavesdropping to take place.

September 5th, 2016|

Spy tool maker can be sued for wiretap violations.

A federal appeals court in Ohio has revived a lawsuit against a company accused of helping a husband spy on his wife and her online friend in violation of state and federal wiretap laws. The case is one of several in recent years to highlight the increasing presence of easy-to-use electronic spy tools in domestic life and divorce proceedings, where evidence of infidelity can carry a tremendous advantage.

August 18th, 2016|

Is Pokémon Go poking holes in your security?

Pokémon Go players could be using corporate accounts or devices to play the game. According to cloud platform provider CloudLock, the first release of the Pokémon Go app, which launched in the United States in early July, requested full access to users’ Google accounts (which were used to register player accounts) through an OAuth connection. This permission, which most users granted without reading the registration screen or considering potential security implications, allowed the app to access to all of the information synced to a user’s account, including contact, calendar and files stored on the device.

August 17th, 2016|

Hidden camera found in apartment vent.

Small covert cameras are difficult to spot. Neighbors are on edge in an Indianapolis apartment complex after a couple found a hidden camera in their apartment. The couple found the camera in their bathroom vent Sunday. We are regularly called to inspect areas to help insure privacy. Not just bathrooms, but targets could include offices, conference rooms, or any place where privacy and confidentiality is desired.

August 17th, 2016|

History: Spy radios, hacking when it counts.

World War II can be thought of as the first electronic war. Radio technology was firmly established commercially by the late 1930s and poised to make huge contributions to the prosecution of the war on all sides. Radio was rapidly adopted into the battlefield, which led to advancements in miniaturization and ruggedization of previously bulky and fragile vacuum tube gear. Radios were soon being used for everything from coordinating battlefield units to detonating anti-aircraft artillery shells.

August 16th, 2016|
Go to Top